Volume 9 (2022)
Volume 8 (2021)
Volume 7 (2020)
Volume 6 (2019)
Volume 5 (2018)
Volume 4 (2017)
Volume 3 (2016)
Volume 2 (2015)
Volume 1 (2014)
Number of Articles: 4
On the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol
Volume 3, Issue 4 , October 2016, Pages 201-209
Abstract
The Internet of Things (IoT) is a new technology, which enables objects to exchange data via the Internet. Authentication process is a method to prevent an unauthorized access to the ... Read MoreMulticollision Attack on a recently proposed hash function vMDC-2
Volume 3, Issue 4 , October 2016, Pages 211-215
Abstract
In this paper, we describe an attack on a new double block length hash function which was proposed as a variant of MDC-2 and MDC-4. The vMDC-2 compression function is based on two calls ... Read MoreRandomized SVD Based Probabilistic Caching Strategy in Named Data Networks
Volume 3, Issue 4 , October 2016, Pages 217-231
Abstract
Named Data Networking (NDN), a data-centric enabled-cache architecture, as one of the candidates for the future Internet, has the potential to overcome many of the current Internet ... Read MorePersian Texts Part of Speech Tagging Using Artificial Neural Networks
Volume 3, Issue 4 , October 2016, Pages 233-241